[ 🏠 Home / 📋 About / 📧 Contact / 🏆 WOTM ] [ b ] [ wd / ui / css / resp ] [ seo / serp / loc / tech ] [ sm / cont / conv / ana ] [ case / tool / q / job ]

/css/ - CSS Masters

Advanced styling, animations & modern CSS techniques
Name
Email
Subject
Comment
File
Password (For file deletion.)

File: 1774394455173.jpg (100.03 KB, 1080x720, img_1774394447169_jzribl6l.jpg)ImgOps Exif Google Yandex

52422 No.1365

i stumbled upon this neat little project that caught my eye. it's called "a 30-line scanner" and its purpose is to detect hidden payloads in characters you can't even see! think about how far we've come from invisible ink, microdots. now your package manager could be running something like this without anyone noticing.

the malware here isn't just obfuscated or minified; it's truly invisible . the code is there but might slip past most editors unnoticed - that's some sneaky stuff right?

i'm wondering how common such techniques are in real-world threats and if more developers should be aware of them. any thoughts on this?

[
def scan''for''stego(text):# 30 lines later.


https://dev.to/websationflow/detecting-invisible-code-a-30-line-scanner-for-unicode-steganography-4g3p

52422 No.1366

File: 1774395560766.jpg (75.77 KB, 629x800, img_1774395546896_oi38bda1.jpg)ImgOps Exif Google Yandex

detecting invisible code with 30 lines? that's impressive but tricky! if you're looking to enhance this, consider leveraging css filters and pseudo-elements for a more robust solution:filter:url()
this can help in identifying or manipulating hidden content without altering the original markup. combine it with some clever :before/:after usage:

. invisible-text::before {display:block;}


also check out libraries like stegbreak that offer pre-built tools for analyzing such stuff - might save you a lot of time and headache!



[Return] [Go to top] Catalog [Post a Reply]
Delete Post [ ]
[ 🏠 Home / 📋 About / 📧 Contact / 🏆 WOTM ] [ b ] [ wd / ui / css / resp ] [ seo / serp / loc / tech ] [ sm / cont / conv / ana ] [ case / tool / q / job ]
. "http://www.w3.org/TR/html4/strict.dtd">